Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Mimic Ransomware is a new type of ransomware that has been discovered to exploit the “Everything” Application Programming Interface (API) for its encryption process.
Researchers discovered the malware in June 2022, and it appears to target mostly English and Russian-speaking people. Some of the code in Mimic resembles that of the Conti ransomware, whose sources were revealed by a Ukrainian researcher in March 2022.
Mimic is delivered as an executable that drops various binaries and a password-protected archive that contains the ransomware payload when unpacked. It also offers tools for disabling Windows Defender and legal sdel binaries.
Mimic Ransomware is a versatile strain that is able to target specific files and folders by using command-line arguments. This allows it to selectively encrypt certain types of files, making it more difficult for victims to recover their data. Additionally, Mimic Ransomware is able to make use of multiple processor threads, which speeds up the encryption process and allows it to encrypt a large number of files in a short amount of time. This makes it more effective and efficient in spreading itself and encrypting files on a targeted computer.
Mimic ransomware is capable of a wide range of things, including the following:
“Everything” is a popular filename search engine for Windows developed by Voidtools. It is known for its speed, efficiency, and minimal system resource usage. The utility allows users to quickly locate files and folders on their computer by searching for their names or parts of their names. It has a simple and easy-to-use interface and can be configured to perform real-time updates, meaning it will automatically update the search results as new files are added or existing files are modified. This feature makes it a useful tool for quickly locating files on a computer, but also makes it an attractive target for malware like Mimic ransomware that can leverage this feature to quickly locate and encrypt all files on the system.
Mimic ransomware is known to use the “Everything32.dll” file, which is dropped onto the compromised system during the infection stage. This file is a component of the “Everything” search engine and contains the search capabilities that the ransomware uses to query for specific file names and extensions on the compromised system.
Everything assists Mimic in locating files that are suitable for encryption while avoiding system files that, if locked, would leave the system unbootable.
Overview of the function (utilizing Everything API)
Mimic-encrypted files have the “.QUIETPLACE” extension. A ransom letter is also dropped, alerting the user of the attacker’s demands and how the data can be restored after paying a Bitcoin ransom.
Ransom note
It is true that Mimic ransomware is a new strain and its activity is yet to be confirmed. However, the fact that it makes use of the Conti builder and the Everything API does suggest that its authors are competent software developers who have a clear understanding of how to achieve their goals.
The use of the Everything API, a popular search tool for Windows, suggests that the attackers have a good understanding of how the tool works and how to leverage its capabilities to locate and encrypt files on a compromised system. This highlights the need for users to be vigilant and take preventative measures to protect their systems from such attacks.